CSC3083 Technology and Society

Overview

As we depend more and more on computer technology, the security and reliability of these systems becomes increasingly important. From banking, to medicine, to education, to online purchases, and more, we depend on computers to operate correctly, and securely in processing this information. This week we will explore the concepts of security and reliability, and the ways that computer systems can fail.

Prayer and Faith Integration Discussion (10 Minutes)

Psalms 18:2 - The Lord is my rock, my fortress and my deliverer; my God is my rock, in whom I take refuge, my shield and the horn of my salvation, my stronghold.

Proverbs 3:5 - Trust in the Lord with all your heart, and do not lean on your own understanding.

Technology has brought so many benefits to us. Mankind has solved so many problems once thought unsolvable by developing new technologies.

The question is, has this increasing trust and dependence on science and technology contributed to mankind losing trust in God as we look to technology for our answers? Has our "need" for God been replaced by a dependence on humanity? Submit your opinion on this idea, and if you believe this is true, include ideas on how we can avoid losing our trust in God.

Class Discussion: The cost of failure (45 minutes)

Article 1 above suggests that software project failures cost between $50 to $80 billion a year. This is money lost in attempting to build systems, and then failing to complete a usable system. That's a lot of loss.

Another estimate gives of figure of $500 billion in loses per month (yes, a month!) due to software failure. These are direct or indirect losses in money due to software in use that fails.

Consider the stories in sections 8.1-8.5. Then consider the question: "Are the benefits of technology worth costs? Why or why not?". You can ask this question about a particular failure, like the Therac-25, or a particular area, like medical technology or financial software, or in general. Write a 400-500 word essay considering this question. Include specific references to some cases in chapter 8, or cases from the articles listed above. Include the consideration of this question from an ethical perspective.

Video Discussion - Privacy lost (Front line video) (60 minutes)

Discuss the answers to the following questions (Students will have turned in answers to these questions):

What is the PRISM program, and what are the Major companies that cooperated with this program?

What is metadata compared to full content? Why is this an important distinction?

What is MUSCULAR program? How was Google unknowingly complicit in the NSA's implementation of this program?

The NSA is, by its charter, restricted to only monitor the communications of non-US citizens. How is the NSA able to monitor foreign communications from within the US?

The NSA sent letters to the heads of all US companies involved in providing internet access ordering them to provide the NSA access to their data, and telling them it was a federal crime to reveal the contents of the order to anyone. Comment of the ethical aspects of such an order.

Edward Snowden has been accused by the US government of damaging US security through his leaks. A recent studysuggests that Snowden's leaks did not help the terrorists. What do you think? Which do you believe is more important to the public, to know the truth about our privacy, or absolute security?

What do you think of the fact that this sort of information can be gathered from you? How does this make you feel?

Should the government allow this? Can it be stopped?

Just like TV, advertisers pay for much of the cost of the content we see. Would you be willing to pay 3, 5, or even 10 times more for internet access to avoid this type of surveillance? Alternatively, would you be willing to pay a subscription fee for each page you visited.

Questions about the Alessandro Acquisti's Talk:

Alessandro talks of a battle. What is this battle?

How do you react to the ideas presented in this talk? Consider the idea of using a composite of your friends' faces to create trust.

Companies give us games and content, and then use our information. Is this a reasonable trade? Why or why not?

How import in transparency in how information is used? Is this enough?

Should we trust that companies will only use our information appropriately?

People say "I don;t post on Facebook, so I'm okay. I only browse, and don;t leave a trace. Is this true?

Questions about the Malte Spitz Talk:

Malte had 35,830 line of information stored on him: where he was, who called him, how he called who he emailed, and more. For 6 months. Why did this bother him.

Does this bother you? Why or why now?

How could this information present a future danger to you. Show we trust the telephone company? The government?